unfuck-my-git-state
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- Data Exposure (LOW): The
scripts/snapshot_git_state.shtool captures repository metadata, includinggit remote -vandgit reflog. These files are stored in a local.git-state-snapshotsdirectory. This metadata can contain sensitive information such as API tokens in remote URLs or historical data in the reflog. This exposure is intrinsic to the skill's purpose of Git state recovery. - Indirect Prompt Injection (LOW): The
scripts/guided_repair_plan.shscript parses local Git output (e.g., branch names, worktree paths). A malicious repository could craft metadata to influence the script's diagnostic logic. - Ingestion points: Reads
worktree_list.txtandstatus.txtgenerated from local Git commands inscripts/snapshot_git_state.sh. - Boundary markers: None identified.
- Capability inventory: The skill suggests Git commands and provides a playbook for manual
.git/HEADmodification. - Sanitization: No sanitization of Git output is performed before parsing.
- Command Execution (SAFE): The skill utilizes standard Git commands for its operations. All command execution is focused on repository management and is consistent with the skill's stated goal of repository recovery.
Audit Metadata